2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT) 2019
DOI: 10.1109/iciict1.2019.8741353
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Private Blockchain Consensus Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 89 publications
(44 citation statements)
references
References 2 publications
0
42
0
2
Order By: Relevance
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
See 2 more Smart Citations
“…Stevens et al 2016 [16] Conti et al 2018 [32] Salman et al 2019 [35] Barron et al 2016 [53] Fu et al 2019 [21] Lu et al 2017 [54] Cyber Resilience Acharjamayum et al 2018 [30] Divey et al 2019 [99] Wang et al 2019 [47] Fraga-Lamas et 2019 [9] Shahaab et al 2019 [3] Ben?i? et al 2018 [10] Maple et al 2019 [29] Alotaibi 2019 [37] Hou et al 2019 [36] He et al 2018 [42] Onwubiko 2020 [41] Sharma et al 2019 [43] Saini et at 2019 [44] Security Frameworks & Solutions Hasan et al 2020 [100] Jaiswal et al 2019 [75] Lallas et al 2019 [79] Madhumida et al 2019 [55] Bose et al 2018 [85] Shwetha et al 2019 [102] Ramalingaiah et al 2018 [103] Omar et al 2019 [104] Li et al 2019 [86] Ding et al 2020 [90] Li et 2018 [105] Xie et al 2018 [91] Bodkhe et al 2019 [94] Epiphaniou et al 2020 [5] Ledwaba et al 2019 [106] Seitz et al 2018 [107] Abdellatif et 2018 [108] Stodt et al 2018 [109] Devi et al 2019 [110] Wang et al 2019 [98] Matzutt et al 2018 [111 ] Sidorov et al 2018 [96] Dinh et al 2018 [48] Demir et al 2018…”
Section: Security Compliancementioning
confidence: 99%
“…Other forms of BFT are Stellar consensus protocol [47] and Delegated BFT. Proof of work (PoW), Proof of stake (PoS), Proof of Elapsed Time (PoET), Proof of Storage and Proof of Authority (PoA) are also types of consensus protocols for validating transactions [32], [43], [48], [47]. Monrat et al [46] made several suggestions for improvement such as standardization and testing based on selected criteria to determine the capability of the system.…”
Section: A Cyber Resiliencementioning
confidence: 99%
See 1 more Smart Citation
“…A novel framework of PoX is presented based on security and computational performance parameters along with tradeoffs in integrating BC as an incentive mechanism. Pahlajani et al [13] presented a proof-based taxonomy of decentralized consensus algorithms based on business analytics to form informed decisions in the applied manufacturing industry sector. Kim et al [14] outlined the survey on an energy-effective and secure consensus algorithm for private blockchain systems.…”
Section: B Existing Surveysmentioning
confidence: 99%
“…Consensus algorithms are of two main categories: 21 proof‐based and vote‐based 31 . In proof‐based consensus algorithms, the nodes joining the network have to solve a cryptographic problem to be able to append a block, while in vote‐based consensus algorithms, there is a voting system that elects miners.…”
Section: Related Workmentioning
confidence: 99%